This document provides an overview of geographic information systems (GIS) and topology. It discusses how GIS uses topology to represent spatial relationships between geometric objects and define properties like connectivity, area definition, and contiguity. The document outlines sources of errors in GIS data and describes techniques for building and validating topology to identify errors. It provides examples of topological rules and explains how Esri's ArcGIS software is used to create, validate, and fix topology errors in GIS vector data.
Introduction to GIS - Basic spatial concepts - Coordinate Systems - GIS and Information Systems – Definitions – History of GIS - Components of a GIS – Hardware, Software, Data, People, Methods – Proprietary and open source Software - Types of data – Spatial, Attribute data- types of attributes – scales/ levels of measurements.
GIS Training is geographical information system and it is mainly used for the storing, recovering, handle, display and examine the all the types of geographical data.
Introduction to GIS - Basic spatial concepts - Coordinate Systems - GIS and Information Systems – Definitions – History of GIS - Components of a GIS – Hardware, Software, Data, People, Methods – Proprietary and open source Software - Types of data – Spatial, Attribute data- types of attributes – scales/ levels of measurements.
GIS Training is geographical information system and it is mainly used for the storing, recovering, handle, display and examine the all the types of geographical data.
An introduction to GIS Data Types. Strengths and weaknesses of raster and vector data are discussed. Also covered is the importance of topology. Concludes with a discussion of the vector-based format of OpenStreetMap data.
This document help you to prepare Triangulation Network (TIN), Hillshade Map, Slope map, interpolation and Digital Elevation Model (DEM) in a area and how to interpret them.
Digitizing in GIS is the process of converting geographic data either from a hardcopy or a scanned image into vector data by tracing the features. During the digitzing process, features from the traced map or image are captured as coordinates in either point, line, or polygon format
Location. Location. Location. With so many maps and datums out there, how does a person know what datum is correct? How come my GPS coordinates don\'t match up on my map? Why is there a shift of 100 metres? How do I transform between different datums? What is a datum? What is the EPSG? Why have GIS Vendors and Oracle adopted them? Does offshore or onshore make a difference? How come there are so many datums? This presentation looks to provide some answers to some of these questions and to point out that latitude and longitude are not absolute.
Over the decades that surveyors have been trying to map the Earth, history and politics have shaped the way we see the world. Are the borders actually there? What if one nation adopts a standard, but the other does not? Does really matter what the co-ordinate system is? Why when I draw the a UTM Projection, the lines are curved, not in a grid? Is the OGC adopting these standards? So many questions and this presentation aims to answer some of them and provide some light on a complicated and sometimes unclear topic.
Mumbai University, T.Y.B.Sc.(I.T.), Semester VI, Principles of Geographic Information System, USIT604, Discipline Specific Elective Unit 1: Introduction to GIS
An introduction to GIS Data Types. Strengths and weaknesses of raster and vector data are discussed. Also covered is the importance of topology. Concludes with a discussion of the vector-based format of OpenStreetMap data.
This document help you to prepare Triangulation Network (TIN), Hillshade Map, Slope map, interpolation and Digital Elevation Model (DEM) in a area and how to interpret them.
Digitizing in GIS is the process of converting geographic data either from a hardcopy or a scanned image into vector data by tracing the features. During the digitzing process, features from the traced map or image are captured as coordinates in either point, line, or polygon format
Location. Location. Location. With so many maps and datums out there, how does a person know what datum is correct? How come my GPS coordinates don\'t match up on my map? Why is there a shift of 100 metres? How do I transform between different datums? What is a datum? What is the EPSG? Why have GIS Vendors and Oracle adopted them? Does offshore or onshore make a difference? How come there are so many datums? This presentation looks to provide some answers to some of these questions and to point out that latitude and longitude are not absolute.
Over the decades that surveyors have been trying to map the Earth, history and politics have shaped the way we see the world. Are the borders actually there? What if one nation adopts a standard, but the other does not? Does really matter what the co-ordinate system is? Why when I draw the a UTM Projection, the lines are curved, not in a grid? Is the OGC adopting these standards? So many questions and this presentation aims to answer some of them and provide some light on a complicated and sometimes unclear topic.
Mumbai University, T.Y.B.Sc.(I.T.), Semester VI, Principles of Geographic Information System, USIT604, Discipline Specific Elective Unit 1: Introduction to GIS
A geographic information system (GIS) is a collection of hardware,
software, geographicdata, and personnel designed to create, store, edit,
manipulate, analyze and display geographically referenced information.
A geographic information system (GIS) is a system designed to capture, store, manipulate, analyze, manage, and present all types of geographical data. The acronym GIS is sometimes used for geographical information science or geospatial information studies to refer to the academic discipline or career of working with geographic information systems and is a large domain within the broader academic discipline of Geoinformatics. In the simplest terms, GIS is the merging of cartography, statistical analysis, and computer science technology.
This is presentation is intended for middle school students. It provides a short introduction to GIS and how to use GIS in the real-world.
ArcGIS Explorer is the software used to demonstrate concepts.
45 minutes + 15 minutes demo
Download ArcGIS Explorer here...
http://www.esri.com/software/arcgis/explorer/
Creates heuristic guidelines for classifying types of networks empirically through a series of network metrics. Introduces metrics and theoretical background of what those network metrics measure with respect to the graph.
Revisiting the Representation of and Need for Raw Geometries on the Linked Da...Blake Regalia
Geospatial data on the Semantic Web historically stems from using point geometries to represent the geographic locations of places. As the practice evolved in the Semantic Web community, a demand for more complex geometries and geospatial query capabilities came about as a consequence of integrating traditional GIS and geo-data into the Linked Data cloud. However, recent projects have revealed that, in practice, these established techniques have major shortcomings that limit their storage, transmission, and query potential. In this position paper, we examine these shortcomings, propose to treat geometries similar to how other binary data are stored and referenced on the Semantic Web, namely by representing them as resources via URIs instead of RDF literals, and demonstrate the utility of precomputing topological relations rather than computing them on-demand by arguing that end users are most often interested in topology and not raw geometries.
Finding Meaning in Points, Areas and Surfaces: Spatial Analysis in RRevolution Analytics
Everything happens somewhere and spatial analysis attempts to use location as an explanatory variable. Such analysis is made complex by the very many ways we habitually record spatial location, the complexity of spatial data structures, and the wide variety of possible domain-driven questions we might ask. One option is to develop and use software for specific types of spatial data, another is to use a purpose-built geographical information system (GIS), but determined work by R enthusiasts has resulted in a multiplicity of packages in the R environment that can also be used.
Synthesis of a Sparse 2D-Scanning Array using Particle Swarm Optimization for...Sivaranjan Goswami
A technique for synthesizing a sparse array from a 16×16 URA is presented.
An ANN model is proposed for calculation of the excitation phase of the 2D array that shows accurate results for both the original URA and the sparse array.
It is observed that the PSLL of the synthesized sparse array is almost the same as that of the URA except at the extreme ends of the scanning range (-45 degree to +45 degree in azimuth and elevation plane).
The overall scan angle of the proposed antenna array is 90 degree for both the azimuth plane and the elevation plane.
The array comprises cosine antenna elements that represent printed antennas used in 5G millimeter-wave wireless communication. Thus, the proposed sparse array has possible applications in 5G wireless communication and radar systems.
Topics:
1. Introduction to GIS
2. Components of GIS
3. Types of Data
4. Spatial Data
5. Non-Spatial Data
6. GIS Operations
7. Coordinate Systems
8. Datum
9. Map Projections
10. Raster Data Compression Techniques
11. GIS Software
12. Free GIS Data Resources
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
4. Limitations of geometry
• If lines are a road network and polygons are
land parcels:
– What about one way streets?
– Which road is between parcels?
– Which parcel is on the ‘left’? (5.1,2.3)
(6.2,3.3)
1
• Something more than
geometry is needed…
(6.6,1.4)
b
a
2
(4.8,1.3)
11/6/2013 8:57 PM
3 (5.7,0.2)
4
5. Topology
• The representation of the arrangements of
geometric objects and the relationships among
them.
• Some fundamental relationships
– Connectivity: what is connected to what.
– Area definition: containment.
– Contiguity: borders and left/right adjacent areas.
11/6/2013 9:24 PM
5
6. Topology
• Topological relationships are invariant under:
– Affine transformations
– Bending
– Stretching.
11/7/2013 11:37 AM
6
http://www.indiana.edu/~gisci/courses/g338/lectures/introduction_vector.html
7. Directed graph (digraph)
• In GIS vector data topology is implemented
using graph theory.
• Graph: A set of
– nodes, and
– ordered pairs of nodes, called arcs
• Each arc connects two
nodes and has direction
from the 1st node to
the 2nd node.
11/7/2013 8:54 AM
7
8. Connectivity: Adjacency
• If an arc joins 2 nodes, the nodes are called
adjacent.
• Represented by the adjacency matrix.
– Encodes direction.
– No arc identity.
11/6/2013 10:20 PM
8
9. Connectivity: Incidence
• If an arc joins 2 nodes, the nodes are called
incident to the arc.
• Incidence matrix
– Encodes direction, and
– Arc identity.
11/6/2013 10:35 PM
9
10. ESRI Coverage: Topological properties
• Connectivity.
– Arcs connect to each other at nodes.
• Area definition.
– Connected arcs that surround an area define a
polygon.
• Contiguity.
– Arcs have direction and left and right sides).
11/7/2013 9:18 AM
Lo and Yeung p. 86
10
11. Coverage Connectivity: Arc-node topology
• Beginning and ending node of each arc.
• Remember: A node is either the end of a
line or the intersection of lines.
11/7/2013 9:33 AM
11
12. Coverage Area definition:
Polygon-arc topology
• Area: series of connected
arcs; polygon-arc list.
• Containment:
– 0 precedes internal polygon.
11/7/2013 8:57 AM
12
13. Coverage Contiguity: Left-right topology
• Relationships between arcs and their left and
right polygons.
• A background polygon (100) must be defined.
11/6/2013 10:59 PM
13
14. Topology creation
• Can we build topology from geometry?
a b
1.
2.
Arc Coordinate List
Arc #
Coordinates
1 (4.8,1.3), (5.1,2.3), (6.2,3.3) (6.6, 1.4)
(6.6, 1.4)
2 (4.8,1.3), (6.2,3.3)
3 (6.2,3.3), (5.7,0.2), (4.8,1.3)
(6.6, 1.4)
(6.2,3.3)
1
(5.1,2.3)
(6.6,1.4)
b
a
2
(4.8,1.3)
3 (5.7,0.2)
11/7/2013 10:07 AM
2. Arc-Node List
1.
Arc #
From-node To- node
1a
b
2a
b
3b
a
14
15. Topology creation
2. Arc-Node List
1.
Arc #
1
A
From-node To- node
1a
b
2a
b
3b
a
b
a
B
3
11/7/2013 9:59 AM
2
3. Polygon-Arc List
Poly #
Arcs
A
1, 2
B
2, 3
15
16. Topology & errors
• Building topology from geometry involves
identifying all nodes, arcs, and polygons.
• What if there are errors in the geometry?
(6.19,3.3)
(6.2,3.3)
1
(5.1,2.3)
– No problem in topology…
–Only in geometry.
(6.6,1.4)
b
a
2
(4.8,1.3)
Polyline Coordinates
1
3 (5.7,0.2)
11/7/2013 10:41 AM
(4.8, 1.3), (5.1, 2.3), (6.19, 3.3), (6.6, 1.4)
2
3
(4.8, 1.3), (6.6, 1.4)
(4.8, 1.3), (5.7, 0.2), (6.6, 1.4)
16
17. Topology & errors
• What about this error?
Polyline Coordinates
(6.2,3.3)
(5.1,2.3)
1
1
2
3
(4.8, 1.3), (5.1, 2.3), 6.2, 3.3), (6.599, 1.4)
(4.8, 1.3), (6.6, 1.4)
(4.8, 1.3), (5.7, 0.2), (6.6, 1.4)
(6.599,1.4) – What happens to node b?
2
(6.6,1.4)
–What happens to polygons?
(4.8,1.3)
3
(5.7,0.2)
11/7/2013 11:44 AM
17
19. Geometry errors
• Geometrical errors
– May cause topological errors, i.e., violations of
topological relathionships
– May only affect spatial data accuracy.
• Accuracy standards govern ‘acceptable’
geometrical errors (see Book, section 7.2).
• Topological errors caused by very small
geometry errors can cause severe effects!
11/7/2013 10:31 AM
19
20. ‘Small’ error example
• An ambulance carrying a stroke victim needs
to take the fastest route from A to B.
• Two arcs in a road network do not ‘exactly
connect’.
• The car navigator takes a long route…
20 miles
B
A
11/7/2013 11:08 AM
3 miles
14 miles
20
21. Line feature topological errors
• Undershoot
– Gap between lines.
• Overshoot
– Overextended lines.
• Both errors cause
dangling nodes.
– Such nodes could be OK
though (when?)
11/7/2013 11:16 AM
21
22. Line feature topological errors
• Pseudonodes
– Nodes not located at end of arc or at line
intersection.
• Direction of line.
– Important in the case of
one way streets or rivers/streams.
11/7/2013 12:32 PM
22
25. Point feature topological errors
• Each polygon requires a label point to link it to
its attribute data.
• If a polygon has zero or several label points, an
error occurs.
×
11/7/2013 12:34 PM
×
25
26. Error sources
• Due to digitization errors within a data layer
– E.g., ‘Heads-down’ manual
map digitization using
a digitizing table.
– ‘Heads-up’ manual digitization
of CAD or scanned rasters
on the screen.
11/7/2013 12:17 PM
26
27. Error sources
• Due to digitization or alignment errors
between layers.
• Don’t need to be of the
same feature type. E.g.:
– Adjoining layer edges don’t match.
11/7/2013 12:15 PM
– Distortion between
overlapping layers.
– Overlap, undershoot,
27
overshoot.
28. Building topology in ArcGIS
• Create topology
1. Define participating feature classes
2. Specify the topology rules between feature
classes
3. Set cluster tolerance
4. Identify the accuracy ranks of the coordinates in
each feature class.
5. Validate topology
6. Find and fix errors or mark exceptions
7. Iterate
11/7/2013 1:06 PM
28
29. ArcGIS topology rules
• Topology rules allow you to define spatial
relationships between features in a single
feature class or subtype or between two
feature classes or subtypes.
• Topology rules allow you to define the spatial
relationships that meet the needs of your data
model.
• A pdf poster with all rules:
http://help.arcgis.com/en/arcgisdesktop/10.0
/help/001t/pdf/topology_rules_poster.pdf
11/7/2013 1:18 PM
29
30. Examples: ArcGIS topology rules
• Data theme: Parcels
• Feature classes:
– Parcel polygons,
– Parcel boundaries (lines)
– Parcel corners (points)
• Some topology rules
– Parcel polygons must not overlap.
– Parcel polygon boundaries must be covered by Parcel
boundary lines.
– Parcel boundary endpoints must be covered by Parcel
corner points.
11/7/2013 1:15 PM
30
34. Identifies point in polygon
containment errors
Multiple
11/6/2013 11:25 PM
34
35. Cluster tolerance
• ArcGIS analyzes the coordinate locations of
feature vertices among features in the same
feature class as well as between the feature
classes that participate in the topology.
• Those that fall within a specified distance of
one another are assumed to represent the
same location and are assigned a common
coordinate value (in other words, they are
collocated).
11/7/2013 1:22 PM
35
36. Cluster tolerance
• A cluster tolerance is used to integrate
vertices.
– All vertices that are within the cluster tolerance
may move slightly in the validation process.
• The default cluster tolerance is based on the
precision defined for the dataset.
• The default cluster tolerance is 0.001 meters
in real-world units.
11/7/2013 1:22 PM
36
38. Z-tolerance
• If necessary, a z-tolerance is also defined to
distinguish whether or not the z-heights or
elevations of vertices are within the tolerance
of one another and should be clustered.
11/7/2013 1:28 PM
38
39. Coordinate accuracy ranks
• Which vertices should move?
• Coordinate ranks ensure that reliably placed
vertices are the anchor locations toward which
less reliable vertices are moved. E.g.,
– RTK-GPS vertices would have high rank (1)
– Standard GPS vertices would have lower rank (2, 3)…
• Equally ranked vertices are geometrically
averaged.
11/7/2013 1:32 PM
39
40. Validate topology: algorithmic
• Algorithmic
clustering and
cracking.
• Insertion of
common coordinate
vertices into
coincident features
that share geometry.
11/7/2013 1:59 PM
40
41. Validate topology: manual
• Topology errors are violations of the rules that
are initially stored as errors in an error log.
• Error features record where topological errors
were discovered during validation.
– Example: Error features for the “must not have
dangles” rule.
11/7/2013 1:43 PM
41
42. Fixing errors
• User intervention
– Change vertex locations, trace new lines and
replace old ones, etc.
Fix!
11/7/2013 2:02 PM
42
43. Mark exceptions
• Certain errors may be acceptable, in which
case the error features can be marked as
exceptions. E.g.:
11/7/2013 1:45 PM
43
44. Iterate
• Topology validation is user driven.
• Dirty areas are areas that have been edited,
updated, or affected by the addition or
deletion of features; they are maintained
automatically by ArcGIS.
• This allows selected parts, rather than the
whole extent of the topology, to be validated.
11/7/2013 1:50 PM
44